Securing MS Exchange 2010: Role Based Access Control (RBAC) Simplified
Written by Samuel Drey, a Premier Field Engineer based in Canada.
Exchange 2010 introduces a brand new permissions model named “RBAC”, meaning Role Based Access Control. There’s plenty of documentation about RBAC since this is a new and important feature of Exchange 2010, but I did not find anything with simple and concise explanations that will help everybody understand how to manage permissions using RBAC at a glance.
Here’s a simple definition of RBAC:
- RBAC enables grouping sets of actions (e.g. cmdlets, features from the graphical management console, as well as features from the Exchange Control Panel – the management console brought through an http connection) into different roles (e.g. a Mail Recipient creation role to manage Mailboxes, that is to create, modify or delete mail objects – mailboxes, mail-enabled users, mail-enabled contact, etc.).
- Several roles can be combined into Management Groups where you can place Administrators or these roles can be directly assigned to end users using Management Role Policies.
2. Defining and using Role Groups: the RBAC permissions model for Administrators and Specialized Users
Management Role Entries are different sets of authorized actions called command-lets or functions with various parameters that are grouped into Management Roles. For example, Create-Mailbox and Delete-Mailbox are 2 command-lets included into the “Mail Recipient creation” role.
Note: You can also create your own roles! Imagine the possibilities as we have 599 Exchange commands in Powershell, each command with 5 to 15 parameters, for an average total of 6,000 parameters and tremendous possibilities of granularity!
That’s why Microsoft gave built-in Management Roles and Management Role groups that are more than enough to secure your Exchange Server 2010 infrastructure objects and configuration items.
Use Get-RoleGroup to list the available built-in Management Role groups.
Use Get-ManagementRole to list the available built-in Management Roles.
Use add-RoleGroupMember / remove-RoleGroupMember in powershell to add or remove Administrators names from the desired role group.
Here is a simple representation that will help you understand how Management Role Entries and Management Roles fit together:
- First you have the authorized cmdlets called Management Role Entries:
- These cmdlets are grouped into Management Roles
- Management Roles are linked to Management Role Groups by Management role Assignments:
Figure: Graphical representation of the Role Group RBAC architecture
Role Assignments are the links between Roles and Role Groups. These will always be identified in the form of “Management Role name – Management Role Group name” or “Management Role name – Management Role Group name - Delegating”, e.g. Mail Recipient Creation-Organization Management.
These also exist in the RBAC model to define the scope of actions. Scopes are defined in the Role Assigment level, either by a parameter of the New-ManagementRoleAssignment cmdlet (RecipientOrganizationalUnitScope) for OU Scopes, or by using the New/Set-ManagementScope for the Recipient and Configuration scopes.
The purpose of these is to limit the objects that an administrator can manipulate or to direct where administrators can perform their administration, and so these are split into 3 categories :
- OU scope: introduced above, these are the simplest custom scopes, in which OU the group member can operate
- Recipient scopes: the Exchange related AD objects a group member can manipulate
- Configuration scopes: the servers and databases that group members can manipulate
There is one recipient scope and one configuration scope per Role Assignment.
Last important feature of the Management Role Assignment: the Exclusive Scope for explicit Management Scopes – these can limit the access to an AD object to these Role assignees only.
In the example illustration below, the “Recipient Administrators” in Ottawa can administer Bob, Peter and Kevin, but cannot administer David, Sharon, Henry, Jenny, Frank or Eric. The VIP Administrators can administer David, Sharon, Frank and Eric. The Executive Administrators can administer Henry, Jenny, Frank and Eric.
Figure. Scopes illustration with Exclusive vs Regular scopes, with example filters (by City, by Title, by Department)
Role Assignment Policies are different from Role Groups in the fact that these are only used at the user mailbox level. These are intended to enable end-users to manage their mailbox and distribution group configuration. Here is the Role Assignment Policy as defined by the Technet :
- Mailbox are assigned a single role assignment policy, to which management roles (containing management role entries, as referred above) are linked by management role assignments.
We notice some commonalities between Role Groups and Role Assignment Policies such as:
- The management role entries (the authorized cmdlets or actions)
- The management roles (defined by a set of cmdlets or actions – the management role entries)
- The Management Role Assignments
Here’s the first difference: the scope of management role assignments for assignment policies are either
- SELF : the role can read (if present in the recipient read scope) or modify (if present on the recipient write scope) only the properties of its current mailbox
- or MYGAL : used with “Recipient Read Scopes” only - the role can view the properties of any recipient within the current user's global address list (GAL)
And as the Role groups were used for Exchange administration, the Management Role Assignment Policies are used for user rights assignments on their mailbox and distribution lists.
Here’s how all these pieces fit together:
Figure: Graphical representation of the RBAC Management Policy architecture
As introduced above,these are ALL the commandlets of powershell functions used to manage RBAC permissions components in Exchange Server 2010 SP1:
Manage Roles |
Get-ManagementRole |
New-ManagementRole |
Remove-ManagementRole |
Manage Role Assignments |
Get-ManagementRoleAssignment |
New-ManagementRoleAssignment |
Remove-ManagementRoleAssignment |
Set-ManagementRoleAssignment |
Manage Role Entries |
Add-ManagementRoleEntry |
Get-ManagementRoleEntry |
Remove-ManagementRoleEntry |
Set-ManagementRoleEntry |
Manage Scopes |
Get-ManagementScope |
New-ManagementScope |
Remove-ManagementScope |
Set-ManagementScope |
Manage Role Assignment Policies |
Get-RoleAssignmentPolicy |
New-RoleAssignmentPolicy |
Remove-RoleAssignmentPolicy |
Set-RoleAssignmentPolicy |
Manage Role Groups |
Get-RoleGroup |
New-RoleGroup |
Remove-RoleGroup |
Set-RoleGroup |
Manage Role group members |
Add-RoleGroupMember |
Get-RoleGroupMember |
Remove-RoleGroupMember |
Update-RoleGroupMember |
ADVICE : Use this table along with the PowerShell “Get-Help” cmdlet, and along with the above schemas to have a clear view of what you are doing and what you want to do to secure your Exchange Server 2010 infrastructure!
2.5.1 Common actions we then can do using the Exchange Management Shell, the Exchange Control Panel, or the Exchange Management Console
Here’s a list of commands, given as examples to apply the above concepts in your environment, all taken from various places on TechNet and tested on a test lab environment:
Giving User1 permission: add them to the RBAC Management Role Groups
General:
Add-RoleGroupMember <role group name> -Member <User or Group name>
Real Life:
Add-RoleGroupMember “Recipient Management” -Member User1
Giving end-users permissions: assign an RBAC Management Role Assignment Policies
General:
Set-Mailbox <UserName> -RoleAssignmentPolicy <Policy name>
Real Life :
Set-Mailbox User1 -RoleAssignmentPolicy “Limit Mailbox configuration”
Adding management roles to a policy
General :
New-ManagementRoleAssignment -Name <role assignment name> -Role <role name> -Policy <assignment policy name>
See the roles on a Management Role Policy :
General and Real Life:
Get-RoleAssignmentPolicy # see all assignment policies in the organization
General :
Get-ManagementRoleAssignment -RoleAssignee <assignment policy name>
Real Life :
Get-ManagementRoleAssignment -RoleAssignee "Default Role Assignment Policy"
Creating a new Role Assignment Policy:
General:
New-RoleAssignmentPolicy <assignment policy name> -Roles <roles to assign>
Real life:
New-RoleAssignmentPolicy "Limited Mailbox Configuration" -Roles MyBaseOptions, MyAddressInformation, MyDisplayName
“Defaulting” a custom Management Role Assignment Policy for newly created mailboxes:
General:
Set-RoleAssignmentPolicy <assignment policy name> -IsDefault
Real life :
Set-RoleAssignmentPolicy “Limited Mailbox Configuration” -IsDefault
List all users that are granted the permissions provided by a specific management role :
Get-ManagementRoleAssignment -Role <role name> -GetEffectiveUsers
The reason why I put this section at the end is that some RBAC management features are only available by using PowerShell. Understanding the RBAC schema and the associated PowerShell functions will help you manage every aspect of your Exchange Server 2010 security.
Also, there are many things you cannot do in the ECP, so you will need to use the Exchange Management Shell (PowerShell with the Exchange extensions). The only RBAC management tasks you can do in ECP are modifying the memberships of role groups and adding or removing roles from role assignment policies.
You must use the Exchange Management Shell to manage every other aspects of RBAC, such as:
- Create, delete or modify custom roles
- Create or delete Role Groups
- Assign roles to Role Groups
- Modify the scope or Role Assignment
- Assign a role directly to a user account
So here are screenshots of ECP regarding RBAC management:
- Use the Exchange Management console to access the ECP RBAC editor:
- You can see the built-in management roles with the assigned roles (these will all use the default scopes) :
- Example of the Organization Management role group configuration in the ECP:
With Exchange Server 2010, permission management is much clearer, granular, and manageable. You can always have a clear view of who has the access to what and where.
The Get-ManagementRoleAssignment commandlet is a good monitoring PowerShell command with which you can audit your permissions assigned to administrators.
Note: to audit all users and groups in your organization to understand their effective permissions, you can use PowerShell piping, like Get-ManagementRole | Get-ManagementRoleAssignment.
Finally, use the Exchange Management Shell to administer and manage your Exchange Server 2010 permissions using the RBAC functions, and the Exchange Control Panel once you understand the concepts of the RBAC model and the ECP RBAC management limitations.
Name AssignedRoles RoleAssignments ManagedBy
---- ------------- --------------- ---------
Organization Management {Active Directory Permissi... {Active Directory Permissi... {CONTOSO.COM/Microsoft Exc...
Public Folder Management {Mail Enabled Public Folde... {Mail Enabled Public Folde... {CONTOSO.COM/Microsoft Exc...
Recipient Management {Distribution Groups, Mail... {Distribution Groups-Recip... {CONTOSO.COM/Microsoft Exc...
View-Only Organization Man... {Monitoring, View-Only Con... {Monitoring-View-Only Orga... {CONTOSO.COM/Microsoft Exc...
UM Management {UM Mailboxes, UM Prompts,... {UM Mailboxes-UM Managemen... {CONTOSO.COM/Microsoft Exc...
Help Desk {User Options, View-Only R... {User Options-Help Desk, V... {CONTOSO.COM/Microsoft Exc...
Records Management {Audit Logs, Journaling, M... {Audit Logs-Records Manage... {CONTOSO.COM/Microsoft Exc...
Discovery Management {Legal Hold, Mailbox Search} {Legal Hold-Discovery Mana... {CONTOSO.COM/Microsoft Exc...
Server Management {Database Copies, Database... {Database Copies-Server Ma... {CONTOSO.COM/Microsoft Exc...
Delegated Setup {View-Only Configuration} {View-Only Configuration-D... {CONTOSO.COM/Microsoft Exc...
Hygiene Management {ApplicationImpersonation,... {ApplicationImpersonation-... {CONTOSO.COM/Microsoft Exc...
RunspaceId : e32249be-3e2a-4748-a9fb-346b0c3a776f
ManagedBy : {CONTOSO.COM/Microsoft Exchange Security Groups/Organization Management}
RoleAssignments : {Distribution Groups-Recipient Management, Mail Enabled Public Folders-Recipient Manageme
nt, Mail Recipient Creation-Recipient Management, Mail Recipients-Recipient Management, M
essage Tracking-Recipient Management, Migration-Recipient Management, Move Mailboxes-Reci
pient Management, Recipient Policies-Recipient Management}
Roles : {Distribution Groups, Mail Enabled Public Folders, Mail Recipient Creation, Mail Recipien
ts, Message Tracking, Migration, Move Mailboxes, Recipient Policies}
DisplayName :
ExternalDirectoryObjectId :
Members : {}
SamAccountName : Recipient Management
Description : Members of this management role group have rights to create, manage, and remove Exchange
recipient objects in the Exchange organization.
RoleGroupType : Standard
LinkedGroup :
Capabilities : {}
LinkedPartnerGroupId :
LinkedPartnerOrganizationId :
IsValid : True
ExchangeVersion : 0.10 (14.0.100.0)
Name : Recipient Management
DistinguishedName : CN=Recipient Management,OU=Microsoft Exchange Security Groups,DC=CONTOSO,DC=COM
Identity : CONTOSO.COM/Microsoft Exchange Security Groups/Recipient Management
Guid : bb51dda2-5d38-4f18-8e1c-68c6f9775526
ObjectCategory : CONTOSO.COM/Configuration/Schema/Group
ObjectClass : {top, group}
WhenChanged : 11/11/2010 3:07:45 PM
WhenCreated : 11/11/2010 3:07:45 PM
WhenChangedUTC : 11/11/2010 8:07:45 PM
WhenCreatedUTC : 11/11/2010 8:07:45 PM
OrganizationId :
OriginatingServer : dc2003.CONTOSO.COM
Name Role Parameters
---- ---- ----------
Write-AdminAuditLog Mail Recipient Creation {Comment, Confirm, Debug, DomainController, ErrorAction, Er...
Set-MailboxFolderPermission Mail Recipient Creation {AccessRights, Confirm, Debug, DomainController, ErrorActio...
Set-ADServerSettings Mail Recipient Creation {ConfigurationDomainController, Confirm, Debug, ErrorAction...
Remove-RemoteMailbox Mail Recipient Creation {Confirm, Debug, DomainController, ErrorAction, ErrorVariab...
Remove-Mailbox Mail Recipient Creation {Arbitration, Confirm, Database, Debug, DomainController, E...
Remove-MailUser Mail Recipient Creation {Confirm, Debug, DomainController, ErrorAction, ErrorVariab...
Remove-MailContact Mail Recipient Creation {Confirm, Debug, DomainController, ErrorAction, ErrorVariab...
New-RemoteMailbox Mail Recipient Creation {AccountDisabled, Alias, Archive, Confirm, Debug, DisplayNa...
New-Mailbox Mail Recipient Creation {AccountDisabled, ActiveSyncMailboxPolicy, Alias, Arbitrati...
New-MailUser Mail Recipient Creation {Alias, ArbitrationMailbox, Confirm, Debug, DisplayName, Do...
New-MailContact Mail Recipient Creation {Alias, ArbitrationMailbox, Confirm, Debug, DisplayName, Do...
Get-User Mail Recipient Creation {Anr, Arbitration, Credential, Debug, DomainController, Err...
Get-ThrottlingPolicyAssocia... Mail Recipient Creation {Anr, Debug, DomainController, ErrorAction, ErrorVariable, ...
Get-ThrottlingPolicy Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...
Get-SharingPolicy Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...
Get-RoleAssignmentPolicy Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...
Get-ResourceConfig Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...
Get-RemoteMailbox Mail Recipient Creation {Anr, Credential, Debug, DomainController, ErrorAction, Err...
Get-Recipient Mail Recipient Creation {Anr, BookmarkDisplayName, ErrorAction, ErrorVariable, Filt...
Get-OrganizationalUnit Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...
Get-ManagementRoleAssignment Mail Recipient Creation {AssignmentMethod, ConfigWriteScope, CustomConfigWriteScope...
Get-ManagedFolderMailboxPolicy Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...
Get-MailboxDatabase Mail Recipient Creation {Debug, DomainController, DumpsterStatistics, ErrorAction, ...
Get-Mailbox Mail Recipient Creation {Anr, Arbitration, Archive, Credential, Database, Debug, Do...
Get-MailUser Mail Recipient Creation {Anr, Credential, Debug, DomainController, ErrorAction, Err...
Get-MailContact Mail Recipient Creation {Anr, Credential, Debug, DomainController, ErrorAction, Err...
Get-DomainController Mail Recipient Creation {Credential, Debug, DomainName, ErrorAction, ErrorVariable,...
Get-ActiveSyncMailboxPolicy Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...
Get-ADServerSettings Mail Recipient Creation {Debug, ErrorAction, ErrorVariable, OutBuffer, OutVariable,...
- Anonymous
March 21, 2015
Very useful information , I like this post. I’m agreed on each point you’ve discussed ,these are major problems of students these days. Many of us can’t take regular classes due to financial or other reasons, it is the best opportunity for them. Thanks for sharing this nice post.
http://www.allassignmenthelp.com/ - Anonymous
December 09, 2018
I really liked your Information. Keep up the good work. Visit: http://rahuldigital.org/orthodontist-seo/ - Anonymous
February 27, 2019
Great informative post for students. Some major problems faced by students in completing the assignments.https://www.homeworkminutes.com - Anonymous
February 27, 2019
Great informative post for students. Some major problems faced by students in completing the assignments. https://www.homeworkminutes.com - Anonymous
May 15, 2019
Thanks for publishing this details. I simply wish to let you know that I just look into your site and also I locate it really fascinating and useful.http://essaywritingservice-alpha.com/custom-essay/ - Anonymous
May 23, 2019
It’s an appropriate time to make some plans for the future and it is time to be happy. Your sl apps lab has full of encouraging ideas; I hope to hear more from you.Regards,<a href="https://play.google.com/store/apps/details?id=com.thunderappstudio.clone.stamp.photo - Anonymous
May 23, 2019
It’s an appropriate time to make some plans for the future and it is time to be happy. Your sl apps lab has full of encouraging ideas; I hope to hear more from you.Regards, Clone Stamp - clone Mirror photo App Thunder 2019 - Anonymous
June 06, 2019
Really nice article. I appreciate such kind of hard and good work. www.assignmentzones.com - Anonymous
June 06, 2019
Really nice article. I appreciate such kind of hard and good work. https://www.assignmentzones.com